[USN-3583-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that an out-of-bounds write vulnerability existed in the
Flash-Friendly File System (f2fs) in the Linux kernel. An attacker could
construct a malicious file system that, when mounted, could cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2017-0750)
It was discovered that a race condition leading to a use-after-free
vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-0861)
It was discovered that the KVM implementation in the Linux kernel allowed
passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM
could use this to cause a denial of service (system crash) in the host OS.
(CVE-2017-1000407)
Bo Zhang discovered that the netlink wireless configuration interface in
the Linux kernel did not properly validate attributes when handling certain
requests. A local attacker with the CAP_NET_ADMIN could use this to cause a
denial of service (system crash). (CVE-2017-12153)
Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel
did not properly track reference counts when merging buffers. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2017-12190)
It was discovered that the key management subsystem in the Linux kernel did
not properly restrict key reads on negatively instantiated keys. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-12192)
It was discovered that an integer overflow existed in the sysfs interface
for the QLogic 24xx+ series SCSI driver in the Linux kernel. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2017-14051)
Otto Ebeling discovered that the memory manager in the Linux kernel did not
properly check the effective UID in some situations. A local attacker could
use this to expose sensitive information. (CVE-2017-14140)
It was discovered that the ATI Radeon framebuffer driver in the Linux
kernel did not properly initialize a data structure returned to user space.
A local attacker could use this to expose sensitive information (kernel
memory). (CVE-2017-14156)
ChunYu Wang discovered that the iSCSI transport implementation in the Linux
kernel did not properly validate data structures. A local attacker could
use this to cause a denial of service (system crash). (CVE-2017-14489)
James Patrick-Evans discovered a race condition in the LEGO USB Infrared
Tower driver in the Linux kernel. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-15102)
ChunYu Wang discovered that a use-after-free vulnerability existed in the
SCTP protocol implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code, (CVE-2017-15115)
It was discovered that the key management subsystem in the Linux kernel did
not properly handle NULL payloads with non-zero length values. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-15274)
It was discovered that the Bluebooth Network Encapsulation Protocol (BNEP)
implementation in the Linux kernel did not validate the type of socket
passed in the BNEPCONNADD ioctl(). A local attacker with the CAP_NET_ADMIN
privilege could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-15868)
Andrey Konovalov discovered a use-after-free vulnerability in the USB
serial console driver in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2017-16525)
It was discovered that the netfilter passive OS fingerprinting (xt_osf)
module did not properly perform access control checks. A local attacker
could improperly modify the system-wide OS fingerprint list.
(CVE-2017-17450)
It was discovered that the HMAC implementation did not validate the state
of the underlying cryptographic hash algorithm. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-17806)
Denys Fedoryshchenko discovered a use-after-free vulnerability in the
netfilter xt_TCPMSS filter of the Linux kernel. A remote attacker could use
this to cause a denial of service (system crash). (CVE-2017-18017)
Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did
not properly restrict mapping page zero. A local privileged attacker could
use this to execute arbitrary code. (CVE-2017-5669)
It was discovered that an integer overflow vulnerability existing in the
IPv6 implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (infinite loop). (CVE-2017-7542)
Tommi Rantala and Brad Spengler discovered that the memory manager in the
Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection
mechanism. A local attacker with access to /dev/mem could use this to
expose sensitive information or possibly execute arbitrary code.
(CVE-2017-7889)
Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP
protocol implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-8824)
Mohamed Ghannam discovered a null pointer dereference in the RDS (Reliable
Datagram Sockets) protocol implementation of the Linux kernel. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2018-5333)
范龙飞 discovered that a race condition existed in loop block device
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-5344)
USN-3524-1 mitigated CVE-2017-5754 (Meltdown) for the amd64
architecture in Ubuntu 14.04 LTS. This update provides the
corresponding mitigations for the ppc64el architecture. Original
advisory details:
Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown. A local attacker could
use this to expose sensitive information, including kernel memory.
(CVE-2017-5754)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-142-generic?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc64-smp?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc64-emb?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc-smp?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc-e500mc?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc-e500?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-lowlatency?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-generic?distro=trusty | < 3.13.0-142.191 |
pkg:deb/ubuntu/linux-image-3.13.0-142-generic-lpae?distro=trusty | < 3.13.0-142.191 |
- ID
- USN-3583-1
- Severity
- critical
- URL
- https://ubuntu.com/security/notices/USN-3583-1
- Published
-
2018-02-23T09:14:24
(6 years ago) - Modified
-
2018-02-23T09:14:24
(6 years ago) - Other Advisories
-
- ALAS-2017-814
- ALAS-2017-870
- ALAS-2017-914
- ALAS-2017-925
- ALAS-2017-937
- ALAS-2018-939
- ALAS-2018-944
- ALAS-2018-956
- ALAS2-2018-939
- ALAS2-2018-956
- ALPINE:CVE-2017-5754
- ASA-201801-1
- ASA-201801-2
- ASA-201801-3
- ASA-201801-4
- ASA-201801-6
- CISCO-SA-20180104-CPUSIDECHANNEL
- DSA-3804-1
- DSA-3927-1
- DSA-3945-1
- DSA-3981-1
- DSA-4073-1
- DSA-4078-1
- DSA-4082-1
- DSA-4120-1
- DSA-4187-1
- ELSA-2017-1842
- ELSA-2017-2930
- ELSA-2017-3566
- ELSA-2017-3567
- ELSA-2017-3631
- ELSA-2017-3632
- ELSA-2017-3633
- ELSA-2017-3635
- ELSA-2017-3636
- ELSA-2017-3637
- ELSA-2017-3640
- ELSA-2017-3651
- ELSA-2017-3657
- ELSA-2017-3658
- ELSA-2018-0007
- ELSA-2018-0008
- ELSA-2018-0151
- ELSA-2018-0169
- ELSA-2018-0292
- ELSA-2018-1062
- ELSA-2018-1319
- ELSA-2018-1854
- ELSA-2018-2390
- ELSA-2018-3083
- ELSA-2018-4001
- ELSA-2018-4006
- ELSA-2018-4017
- ELSA-2018-4020
- ELSA-2018-4022
- ELSA-2018-4025
- ELSA-2018-4040
- ELSA-2018-4041
- ELSA-2018-4114
- ELSA-2018-4161
- ELSA-2018-4193
- ELSA-2018-4268
- ELSA-2018-4285
- ELSA-2018-4289
- ELSA-2018-4299
- ELSA-2018-4300
- ELSA-2018-4301
- ELSA-2019-4316
- ELSA-2019-4317
- ELSA-2019-4531
- ELSA-2019-4585
- ELSA-2019-4850
- ELSA-2019-4854
- ELSA-2019-4855
- ELSA-2020-2430
- FEDORA-2017-0aa0f69e0c
- FEDORA-2017-129969aa8a
- FEDORA-2017-1b4d140781
- FEDORA-2017-2e1f3694b2
- FEDORA-2017-387ff46a66
- FEDORA-2017-39b5facda0
- FEDORA-2017-544eef948f
- FEDORA-2017-62e3a94f2a
- FEDORA-2017-6764d16965
- FEDORA-2017-7369ea045c
- FEDORA-2017-7462231059
- FEDORA-2017-a3a8638a60
- FEDORA-2017-aa9927961f
- FEDORA-2017-ba6b6e71f7
- FEDORA-2017-c110ac0eb1
- FEDORA-2017-cafcdbdde5
- FEDORA-2017-e07d7fb18e
- FEDORA-2017-f73d3f1fc4
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-1e033dc308
- FEDORA-2018-262eb7c289
- FEDORA-2018-2a0f8b2c9d
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-2f6df9abfb
- FEDORA-2018-49bda79bd5
- FEDORA-2018-4ca01704a2
- FEDORA-2018-6367a17aa3
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-8484550fff
- FEDORA-2018-884a105c04
- FEDORA-2018-8dc60a4feb
- FEDORA-2018-93c2e74446
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9d0e4e40b5
- FEDORA-2018-b57db4753c
- FEDORA-2018-b68776e5b0
- FEDORA-2018-b997780dca
- FEDORA-2018-c0a1284064
- FEDORA-2018-c449dc1c9c
- FEDORA-2018-d77cc41f35
- FEDORA-2018-e71875c4aa
- FEDORA-2018-e8f793bbfc
- FREEBSD:74DAA370-2797-11E8-95EC-A4BADB2F4699
- GLSA-201810-06
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2930
- RHSA-2017:2931
- RHSA-2018:0016
- RHSA-2018:0151
- RHSA-2018:0152
- RHSA-2018:0169
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1319
- RHSA-2018:1854
- RHSA-2018:2390
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2020:2430
- SSA:2018-016-01
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:2286-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2389-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2769-1
- SUSE-SU-2017:2770-1
- SUSE-SU-2017:2771-1
- SUSE-SU-2017:2772-1
- SUSE-SU-2017:2773-1
- SUSE-SU-2017:2774-1
- SUSE-SU-2017:2775-1
- SUSE-SU-2017:2776-1
- SUSE-SU-2017:2777-1
- SUSE-SU-2017:2778-1
- SUSE-SU-2017:2779-1
- SUSE-SU-2017:2780-1
- SUSE-SU-2017:2781-1
- SUSE-SU-2017:2782-1
- SUSE-SU-2017:2783-1
- SUSE-SU-2017:2784-1
- SUSE-SU-2017:2785-1
- SUSE-SU-2017:2786-1
- SUSE-SU-2017:2787-1
- SUSE-SU-2017:2788-1
- SUSE-SU-2017:2790-1
- SUSE-SU-2017:2791-1
- SUSE-SU-2017:2792-1
- SUSE-SU-2017:2793-1
- SUSE-SU-2017:2796-1
- SUSE-SU-2017:2797-1
- SUSE-SU-2017:2801-1
- SUSE-SU-2017:2847-1
- SUSE-SU-2017:2869-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:2956-1
- SUSE-SU-2017:3165-1
- SUSE-SU-2017:3210-1
- SUSE-SU-2017:3249-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2017:3267-1
- SUSE-SU-2017:3398-1
- SUSE-SU-2017:3410-1
- SUSE-SU-2018:0010-1
- SUSE-SU-2018:0011-1
- SUSE-SU-2018:0012-1
- SUSE-SU-2018:0031-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0115-1
- SUSE-SU-2018:0180-1
- SUSE-SU-2018:0213-1
- SUSE-SU-2018:0219-1
- SUSE-SU-2018:0237-1
- SUSE-SU-2018:0238-1
- SUSE-SU-2018:0239-1
- SUSE-SU-2018:0240-1
- SUSE-SU-2018:0241-1
- SUSE-SU-2018:0242-1
- SUSE-SU-2018:0243-1
- SUSE-SU-2018:0244-1
- SUSE-SU-2018:0245-1
- SUSE-SU-2018:0249-1
- SUSE-SU-2018:0250-1
- SUSE-SU-2018:0251-1
- SUSE-SU-2018:0252-1
- SUSE-SU-2018:0253-1
- SUSE-SU-2018:0265-1
- SUSE-SU-2018:0266-1
- SUSE-SU-2018:0267-1
- SUSE-SU-2018:0268-1
- SUSE-SU-2018:0270-1
- SUSE-SU-2018:0271-1
- SUSE-SU-2018:0274-1
- SUSE-SU-2018:0275-1
- SUSE-SU-2018:0276-1
- SUSE-SU-2018:0285-1
- SUSE-SU-2018:0383-1
- SUSE-SU-2018:0416-1
- SUSE-SU-2018:0437-1
- SUSE-SU-2018:0438-1
- SUSE-SU-2018:0472-1
- SUSE-SU-2018:0482-1
- SUSE-SU-2018:0525-1
- SUSE-SU-2018:0552-1
- SUSE-SU-2018:0552-2
- SUSE-SU-2018:0555-1
- SUSE-SU-2018:0601-1
- SUSE-SU-2018:0609-1
- SUSE-SU-2018:0638-1
- SUSE-SU-2018:0660-1
- SUSE-SU-2018:0678-1
- SUSE-SU-2018:0834-1
- SUSE-SU-2018:0841-1
- SUSE-SU-2018:0848-1
- SUSE-SU-2018:0909-1
- SUSE-SU-2018:0986-1
- SUSE-SU-2018:1080-1
- SUSE-SU-2018:1172-1
- SUSE-SU-2018:1220-1
- SUSE-SU-2018:1221-1
- SUSE-SU-2018:1222-1
- SUSE-SU-2018:1224-1
- SUSE-SU-2018:1226-1
- SUSE-SU-2018:1227-1
- SUSE-SU-2018:1228-1
- SUSE-SU-2018:1229-1
- SUSE-SU-2018:1230-1
- SUSE-SU-2018:1231-1
- SUSE-SU-2018:1232-1
- SUSE-SU-2018:1233-1
- SUSE-SU-2018:1234-1
- SUSE-SU-2018:1235-1
- SUSE-SU-2018:1236-1
- SUSE-SU-2018:1237-1
- SUSE-SU-2018:1240-1
- SUSE-SU-2018:1241-1
- SUSE-SU-2018:1242-1
- SUSE-SU-2018:1243-1
- SUSE-SU-2018:1244-1
- SUSE-SU-2018:1245-1
- SUSE-SU-2018:1247-1
- SUSE-SU-2018:1248-1
- SUSE-SU-2018:1250-1
- SUSE-SU-2018:1251-1
- SUSE-SU-2018:1252-1
- SUSE-SU-2018:1253-1
- SUSE-SU-2018:1254-1
- SUSE-SU-2018:1255-1
- SUSE-SU-2018:1256-1
- SUSE-SU-2018:1257-1
- SUSE-SU-2018:1259-1
- SUSE-SU-2018:1260-1
- SUSE-SU-2018:1261-1
- SUSE-SU-2018:1262-1
- SUSE-SU-2018:1263-1
- SUSE-SU-2018:1264-1
- SUSE-SU-2018:1266-1
- SUSE-SU-2018:1267-1
- SUSE-SU-2018:1268-1
- SUSE-SU-2018:1269-1
- SUSE-SU-2018:1270-1
- SUSE-SU-2018:1272-1
- SUSE-SU-2018:1273-1
- SUSE-SU-2018:1309-1
- SUSE-SU-2018:1603-1
- SUSE-SU-2018:1658-1
- SUSE-SU-2018:1699-1
- SUSE-SU-2018:1699-2
- SUSE-SU-2018:2528-1
- SUSE-SU-2018:3230-1
- SUSE-SU-2018:3746-1
- SUSE-SU-2018:3869-1
- SUSE-SU-2019:1289-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2478-1
- SUSE-SU-2023:0634-1
- USN-3265-1
- USN-3265-2
- USN-3312-1
- USN-3312-2
- USN-3314-1
- USN-3361-1
- USN-3444-1
- USN-3444-2
- USN-3469-1
- USN-3469-2
- USN-3485-1
- USN-3485-2
- USN-3485-3
- USN-3487-1
- USN-3516-1
- USN-3522-1
- USN-3522-2
- USN-3523-1
- USN-3523-2
- USN-3524-1
- USN-3524-2
- USN-3525-1
- USN-3540-1
- USN-3540-2
- USN-3541-1
- USN-3541-2
- USN-3581-1
- USN-3581-2
- USN-3581-3
- USN-3582-1
- USN-3582-2
- USN-3583-2
- USN-3597-1
- USN-3597-2
- USN-3617-1
- USN-3617-2
- USN-3617-3
- USN-3619-1
- USN-3619-2
- USN-3632-1
- VU:584653
- XSA-254
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-142-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-142-generic | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-142-powerpc64-smp | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-142-powerpc64-emb | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-142-powerpc-smp | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-142-powerpc-e500mc | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-142-powerpc-e500 | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-142-lowlatency | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-generic?distro=trusty | ubuntu | linux-image-3.13.0-142-generic | < 3.13.0-142.191 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-142-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-142-generic-lpae | < 3.13.0-142.191 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |